Gem-Security / gem-environment-assessmentLinks
Utilities for assessing cloud environments
☆19Updated 2 years ago
Alternatives and similar repositories for gem-environment-assessment
Users that are interested in gem-environment-assessment are comparing it to the libraries listed below
Sorting:
- A python module to allow for easy integration with the Lacework APIs.☆18Updated last year
- Trigger vulnerability assessments for containers which are active in a Lacework account/organization☆22Updated last year
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆633Updated this week
- AWS CloudSaga - Simulate security events in AWS☆468Updated this week
- ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring su…☆1,006Updated 2 weeks ago
- ☆1,012Updated 2 weeks ago
- Terraform module to set up your AWS account with the secure baseline configuration based on CIS Amazon Web Services Foundations and AWS F…☆1,182Updated last year
- Open-source temporary elevated access solution for AWS IAM Identity Center.☆417Updated last week
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆250Updated last month
- Protect your data in AWS S3 with DataCop!☆14Updated 11 months ago
- The AWS Secure Environment Accelerator is a tool designed to help deploy and operate secure multi-account, multi-region AWS environments …☆764Updated last week
- Run detections and view dashboards for your GCP audit logs to monitor and analyze activity across your GCP projects using Powerpipe and T…☆12Updated 4 months ago
- Automated Security Response on AWS is an add-on solution that works with AWS Security Hub to provide a ready-to-deploy architecture and a…☆444Updated 3 weeks ago
- AWS IAM linting library☆1,090Updated 2 months ago
- Bare minimum AWS Security Alerting and Secure by default Configuration☆508Updated 3 months ago
- Runs checks to see if an EKS cluster follows EKS Best Practices.☆922Updated 2 months ago
- aws-security-architecture☆13Updated last year
- An AWS tool to help you create a point in time assessment of your AWS account using Prowler.☆564Updated 2 months ago
- A repository of breaches of AWS customers☆778Updated 3 weeks ago
- This repository can be used to generate and evaluate findings detected by Amazon GuardDuty☆406Updated 2 months ago
- A command-line tool to get valuable information out of AWS CloudTrail☆821Updated last week
- Pike is a tool for determining the permissions or policy required for IAC code☆744Updated last week
- Deployment models for AWS Network Firewall with Terraform☆13Updated last year
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆263Updated this week
- High availability implementation of AWS NAT instances.☆1,173Updated last week
- IAM Least Privilege Policy Generator☆2,106Updated this week
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆611Updated this week
- aws2tf - automates the importing of existing AWS resources into Terraform and outputs the Terraform HCL code.☆682Updated this week
- [MAMIP] Monitor AWS Managed IAM Policies Changes☆487Updated last week
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,120Updated last week